www.datasecurityinc.com 1-800-225-7554 sales@telesis-inc.com

Similar documents
NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL Issue Date: 15 December 2014 Revised:

Information Technology Services Guidelines

Secure Mobile Shredding and. Solutions

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

Evaluated Products List - Degausser

Best Practices for Responsible Disposal of Tape Media

Technical Reference Document Summary of NIST Special Publication : Guidelines for Media Sanitization

Information Destruction Solutions

Destruction and Disposal of Sensitive Data

Whitepaper. Mag EraSURE : the Cost-effective Solution for Securely Erasing Magnetically Recorded Data. Degausser

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

Media Disposition and Sanitation Procedure

NCTE Advice Sheet Storage and Backup Advice Sheet 7

HIPAA Training for Staff and Volunteers

Approved By: Agency Name Management

Tutorial on Disk Drive Data Sanitization. Summary. Introduction. Table of Contents

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

Student Guide.

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

HIPAA Training for Hospice Staff and Volunteers

INFORMATION PROCEDURE

HIPAA Security. assistance with implementation of the. security standards. This series aims to

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

CITY UNIVERSITY OF HONG KONG. Information Classification and

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Electronic Records Management Guidelines

Challenges and Solutions for Effective SSD Data Erasure

Office Equipment Disposal Policy

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

MEDIA SANITIZATION MANUAL

TERMINAL CONTROL MEASURES

Guidelines for Media Sanitization

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Hard Drive Retention Offering for Xerox Products in the United States

Payment Card Industry (PCI) Policy Manual. Network and Computer Services

LSE PCI-DSS Cardholder Data Environments Information Security Policy

Securing Data on Portable Media.

HIPAA Security Alert

University of Wisconsin-Madison Policy and Procedure

**************** UNCLASSIFIED / **************** Precedence: ROUTINE DTG: Z Aug 12 Originator: DON CIO WASHINGTON DC(UC) UNCLASSIFIED//

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

ACE Advantage PRIVACY & NETWORK SECURITY

Local Government Cyber Security:

PCI Data Security and Classification Standards Summary

Enterprise Information Security Procedures

Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if you have questions! Lab #2 Today. Quiz #1 Tomorrow (Lectures 1-7)

Destroying Flash Memory-Based Storage Devices (draft v0.9)

Saint Louis University Merchant Card Processing Policy & Procedures

TYPES OF POSSIBLE IDENTITY THEFT

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Guidance on Personal Data Erasure and Anonymisation 1

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006

Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

California State University, Sacramento INFORMATION SECURITY PROGRAM

Document Management Plan Preparation Guidelines

Cyber Self Assessment

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

How To Destroy Data From A Hard Drive


Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Credit Card Processing and Security Policy

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

Information Security Program Management Standard

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Network and Workstation Acceptable Use Policy

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Self-Service SOX Auditing With S3 Control

Building an ITAD Program:

plantemoran.com What School Personnel Administrators Need to know

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Transcription:

www.datasecurityinc.com 1-800-225-7554 sales@telesis-inc.com

Overview For more than 27 years Data Security Inc. has been manufacturing degaussers to support the Department of Defense (DoD) requirements for complete erasure of classified or sensitive magnetic storage devices. Data Security Inc. s main focus is to develop and manufacture high performance degaussers and hard drive destruction devices that guarantee the complete erasure of data stored on existing and future magnetic data storage formats. Because of Data Security s continuing focus on meeting National Security Agency (NSA) standards, we have developed a close working relationship with them. This relationship givse us insight into current and future media formats, as well as the various requirements for sanitizing them. Degaussers listed in the NSA Evaluated Products List-Degausser are ideal tools for organizations required to comply with DoD requirements, NISPOM, National Institute of Standards and Technology (NIST), Federal Information Security Management Act (FISMA) and privacy legislation, including the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA).

Data at Risk Data at Risk Media at Risk Acquisition Methods Classified or Sensitive DoD Defense Contractors Proprietary Information Personal Identity Information SSN Banking Health care information Desktop Hard Drives Laptop/Notebook Hard Drives HDDs in storage array Server Drive External USB Drives Firewire Drives USB Devices Magnetic Tapes Flash Cards CD & DVD Dumpster Diving Acquire improperly sanitized electronic media Laboratory reconstruction Hot Swapped Media Media in Transport Theft Developing countries do not have enough funding to catch up to developed countries, so they steal information and technology. FBI Identity theft costs $50 billion/year. Federal Trade Commission

Data at Risk In the News Electronic Afterlife: What you don t want to know about improper computer disposal, but should Hundreds of thousands of tons of E-waste are shipped overseas to developing countries each year, even after promises that the waste will be safely and locally recycled. Many of the countries receiving our E-waste are listed by the U.S. Department of State as the top sources of cyber crime. -Peter Klein, Digital Dumping Ground Documentary (2009) PA: Health Insurer Loses Hard Drive Comprising 280,000 Medicaid Patients Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan announced that a hard drive containing the personal health information has been misplaced. Yet to be recovered, the drive contains patient addresses, DOBs, health information, and both full and partial Social Security numbers. -Jane M. Von Bergen, The Philadelphia Inquirer (October 2010) http://www.philly.com/inquirer/business/20101020_health_insurers_say_data_on_280_000_pennsylvania_clients_may_be_compromised.html TX: Stolen Hard Drive Compromises 79,000 Airline Employees American Airlines reported a hard drive stolen from headquarters. The drive contains sensitive files for current and former employees dating back to 1960, including Social Security numbers, health insurance, and bank accounts. Some employee files also contained information on beneficiaries and dependents. -Angela Moscaritolo, SC Magazine (July 2010) http://www.scmagazineus.com/american-airlines-hard-drive-stolen/article/174254/ NJ: Data Breach Costs Credit Card Payment Company $130 Million After agreeing to a $60 million settlement with Visa earlier in the year, Heartland Payment Systems has added another $41 million for MasterCard as the result of a 2008 data breach which resulted in thousands of fraudulent charges. - (June 2010) http://destructdata.com/blog/

Regulatory Environment

Regulatory Environment The NIST Guidelines for Media Sanitization refer to the NSA for products to sanitize magnetic media. NIST Special Publication 800-88, pg 12-21 The HIPPA Security Rule (SR) requires the final disposition of information/the hardware electronic media on which it is stored; HIPPA refers to NIST/NSA. Department of Health & Human Services HIPP 164.310 Physical safeguards; Final Rule Under the HITECH Act ( The Act ), business associates are now directly on the compliance hook; ie. required to comply with the Security Rule (SR) or be fined for willful neglect ($250,000 per fine). HITECH Act Sec. 13401. Application of Security Provisions and Penalties to Business Associates of Covered Entities; Annual Guidance on Security Provisions The Gramm-Leach-Bliley (GLB) Act requires financial institutions to ensure the security and confidentiality of personal information obtained from their customers by erasing, degaussing or destroying electronic media. GBL Act, 15 U.S.C. 6081 et seq., and the Federal Trade Commissions Standards for Safeguarding Customer Information, 16 CFR Part 314 Safeguards Rule The Payment Card Industry (PCI) Data Security Standard directs to destroy media containing cardholder data when it is no longer needed as follows: Render cardholder data on electronic media unrecoverable so that cardholder data cannot be reconstructed (for example, degaussing). PCI DSS Requirements and Security Assessment Procedures, V1.2.1 pg 46

ISFO Process Manual Rev. 3 2011.1, page 152

ISFO Process Manual Rev. 3 2011.1, page 151 Note: The terms Type I-III are being replaced by the actual media coercivity rating.

Degausser Dictionary de gauss (d-gous) tr.v. de gaussed, de gauss ing, de gauss es 1. To neutralize the magnetic field of (a ship, for example). 2. To erase information from (a magnetic disk or other storage device). Gauss: the CGS unit of magnetic flux density or magnetic induction. Oersted: the CGS unit of magnetic field strength. The magnetic field produced at the center of a solenoid or coil magnetic field strength of one Oe is equivalent to magnetic flux density of one gauss. Coercivity: the amount of applied magnetic field required to reduce magnetic induction to zero Coercivity is usually measured in Oersted

Previous NSA Test Procedure

Current NSA Test Procedure Center for Magnetic Recording Research at the University of San Diego, California (CMRR) Guarantee that no data can be recovered by any means, including laboratory attack. Test degaussers Test media Strength Uniformity Potential Useful life Stress Test (durability) Coercivity of media Guaranteed erasure Uniformity of degausser field

Current NSA Test Procedure

Current NSA Test Procedure HD-5T 5000 Oersted Disk Before After

DoD Data Recovery Methods Disk Spin-Stand Testers Used for testing and experimenting with heads and disks Used mostly for R&D Tester writes specific data or servo pattern Very accurate for analyzing raw disks Reading a disk that has been written by a drive is more challenging Not cost-effective for routine data recovery Magnetic Force Microscopes (MFM) Best tool for analyzing magnetic data on disks Provides extraordinary imagery of the topology disk properties Probe is placed on the disk surface Time consuming Excellent tool for reading overwritten data Overwritten tracks leave portions of previously written data due to head shift Physical movement of drive Age of disk drive Deteriorating lubricants Current technology used by the NSA Tape Ferrofluidic Imaging Liquid which becomes strongly polarized in the presence of a magnetic field Composed of nanoscale ferromagnetic particles suspended in a carrier fluid, usually an organic solvent or water Tape tracks are made visible by coating the tape with a ferrofluid that is magnetically developing

Commercial Data Recovery Methods Disk Assess Disk Drive Operational Mirror data Create raw image to new media Component Failure Replace defective components Mirror data Create raw image to new media Logical/Software Failure Examining raw image at the low-level data sectors Apply fixes to file system structure Access data Restore data Tape Assess Tape Media Operational Test accessibility with lab equipment Component Failure Clean, splice and re-spool into new cartridge Create raw image from readable portions Examine low-level data sectors Determine tape fixes to format structures Access data Restore data

NSA/CSS Evaluated Products List-Degausser Introduction The EPL-Degausser (Evaluated Products List Degausser) specifies the model identification of current equipment units that were evaluated against and found to satisfy the requirements for erasure of magnetic storage devices that retain sensitive or classified data. Degaussers listed in this document are rated by the coercivity of the magnetic storage devices they can securely erase (tape and disk storage devices). Tape storage devices are defined as any product that contains magnetic tape as the recording medium. Disk storage devices are defined as any product that contains a flexible or rigid disk as the recording medium. Proper use of this equipment is necessary to ensure inadvertent disclosure of any level of classified or sensitive information. Any questions about equipment operations should be directed to the manufacturer.

Media Specifications Hard Drive Coercivity Chart Hard Drive Coercivity Chart

Disk Recording Longitudinal Recording Each bit of information is represented by a collection of magnetized particles. North and south poles oriented in one direction or the other parallel to the disk's surface in a ring around its center. Perpendicular Recording Poles are arranged perpendicular to the disk's surface. More bits can be packed onto a disk.

NSA/CSS Evaluated Products List-Degausser 9. Standalone Degaussers: These are standalone electromagnetic degaussers that provide automatic one pass operation for disk and tape storage device erasure. On hard disk drives, all extraneous steel shielding materials (e.g., cabinets, casings, and mounting brackets), but not the hard disk assembly, must be removed before degaussing. The degaussers must be operated at their full magnetic field strength. The erasure of hard disk drives causes damage that prohibits their continued use.

NSA/CSS Evaluated Products List-Degausser

HD-5T Degausser and DB-4000 Disk Drive Bender DUO Key Features : Listed on the National Security Agency (NSA) Evaluated Products List-Degausser (EPL-Degausser) NSA/CSS-EPL-9-12A. Meets all NSA, DoD, state, federal, financial and health care regulations, mandates and security guidelines. Simple, automatic operation; designed for reliability, performance, and operator safety. Fast; a combined cycle time of 44-69 seconds per cycle with a throughput of 82-327 drives per hour. Unique, internal Field CheckR provides magnetic field verification of the HD-5T degausser and satisfies requirements for degausser testing. With the largest chamber in an automatic destruction device, the DB-4000 accommodates oversized media as well as multiple pieces per cycle. Compact, lightweight and mobile; the optional cart provides the convenience of combining the degausser and destruction device in one place while providing effortless mobility. Built to last; requires no preventative maintenance or expensive repairs.

HPM-2 Degausser and DB-6000 Disk Drive Bender DUO Key Features : Listed on the National Security Agency (NSA) Evaluated Products List-Degausser (EPL-Degausser) NSA/CSS-EPL-9-12A. Meets all NSA, DoD, state, federal, financial and health care regulations, mandates and security guidelines. Fast; a combined cycle time of 18-22 seconds per cycle with a throughput of 200-800 hard drives per hour. Environmentally friendly solution; manual operation requires no electricity. DB-6000 destruction device allows choice of power sources: a manual handle or the added speed and efficiency of a cordless drill (drill not included). Compact, lightweight and mobile; the optional cart provides the convenience of combining the degausser and destruction device in one place while providing effortless mobility. Built to last; requires no preventative maintenance or expensive repairs.

Degausser testing Evaluated Products List-Degausser The EPL (Evaluated Products List) Degausser specifies the current models of commercial equipment that satisfy NSA/CSS requirements for erasure of magnetic storage devices retaining any level of classified or sensitive data. Listing on the EPL-Degausser does not constitute endorsement of the product by the USG or NSA/CSS; it only states that the evaluated degausser has met the applicable NSA/CSS performance requirements. Neither does the listing guarantee continued performance; customers should have their equipment re-tested periodically according the manufacturer s recommendations. ISFO Process Manual Rev. 3 2011.1, page 150-151 Degaussers should be tested periodically using the timetable established by DSS and NSA. The degausser must be tested within six months after the initial new purchase or immediately if purchased used. Even products on the EPL must be re-tested twice a year for the first two years, then once a year thereafter. If the results are marginal, the degausser must be re-tested within six months.

Field CheckR Key Features: Listed in the National Security Agency Evaluated Products List-Degausser. Instantly verifies the magnetic field of any degausser. Designed to allow user the ability to test more often than annually or biannually.

Commercial Degaussers Not listed in the NSA EPL-Degausser Magnetic field is not strong General rule Gauss (Oersted) applied to media must be 2x Coercivity. Advertised Gauss is measured at the core. Magnetic fields dissipate very rapidly from the magnetic core. Disks located in center of HDD and top of HDD are subjected to fields much weaker than the Coercivity of the media.

Storage Excess media storage is a security risk. Additional inventory of excess media requires additional administrative procedures, storage space and labor necessary to control. Without adequate storage or sanitization procedures, classified magnetic media is often stored in obscure locations (behind bookshelves, false bottoms in desk drawers), increasing the risks associated with storing classified information. Media with large storage capacity and small physical size can be easily removed by employees (e.g., LTO III 400 GB, SDLTII 300 GB, VXA 160 GB).

Overwrite Challenges

Destruction: Paper, Optical, Key Tape, HDD after Degaussing, National Security Agency (NSA) provides Media Destruction Guidance. http://www.nsa.gov/ia/guidance/media_destruction_guidance/index.shtml The NSA has determined that High Security Disintegrators listed on the Evaluated Products List provide adequate security for the destruction of paper, optical media (CDs and DVDs), and punched tape as annotated on the EPL. For destroying paper only, a list of evaluated High Security Crosscut Paper Shredders is available. For sanitizing magnetic media, a list of evaluated degaussers is available. NSA Guidance: it is highly recommended that the hard disk drive be physically damaged prior to release. (NSA/CSS 9-12 Storage Device Declassification Manual) NSA Evaluated Products List- HDD Destruction Devices, post degaussing, pending publication. Department of Navy Processing of Magnetic Hard Drive Storage Media for Disposal says all DoN-owned magnetic hard drive storage media will remain in DoN custody until degaussed, destroyed. Destruction can be as simply bending the hard drive. (DON CIO Privacy Term August 5, 2010)

Destruction After Degaussing Punched Folded Shredded least secure NSA preferred physical destruction method time consuming, expensive, and equipment requires frequent repairs

Destruction: Solid State Media NSA Guidance: Destruction to 2 mm particle size

SSMD-2mm Key Features: Meets National Security Agency (NSA) and Department of Defense (DoD) specification for the destruction of solid state media and optical media to 2 mm. Unique dual stage disintegration process destroys solid state storage media (memory cards, memory boards, thumb drives, cell phones, tablets, solid state drives) and optical media (CDs, DVDs, Blu-Ray disks). Simple, automatic push button operation, designed for reliability, performance, and operator safety. Senses and automatically adjusts to clear and prevent jams. Parts are designed for reuse, and easily rotate for a additional use, resharpening or quick replacement. Compact and clean, ideal for any setting, including offices.

Data Security, Inc. Contact us: 800-225-7554 729 Q Street Lincoln NE 68508 datasecurityinc.com